A technician has installed new vulnerability scanner software on a server that is joined to the company domain. The vulnerability scanner is able to provide visibility over the patch posture of all company's clients.Which of the following is being used?

A. Gray box vulnerability testing
B. Passive scan
C. Credentialed scan
D. Bypassing security controls


Answer: C. Credentialed scan

Computer Science & Information Technology

You might also like to view...

You can use the Java method ______________ from the Color class to change the drawing color.

a. changeColor b. getColor c. setColor d. useColor

Computer Science & Information Technology

Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which hardware component predicts what data will be needed and makes that data available to the CPU's internal memory?

A. cache controller B. data bus C. address bus D. RAM controller

Computer Science & Information Technology

The CompareValidator object on a web form can be used only to compare the value of one object to the value of another object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology